8.The
maximum number of relationship instances that an entity can participate in,can
be specified by:

A.Degree

B.Cardinality ratio*

C.Participation constraint

D.Dependency constraint

Ans:B

9.The time
required to insert an element in a stack with linked implementation is:

Ans.O(1)

10.FPI
stands for:

A.Faults per inch

B.Frames per inch*

C.Figure per inch

D.Film per inch

Ans:B

11.A binary
search tree is generated by inserting the following integers in order50,15,62,5,20,58,91,3,8,37,60,24

The number
of nodes in the left sub tree and right sub tree of the root respectively is:

Ans:7,4

12.What is
the postfix form of the following expression:

A+(B*C-(D/E^F)*G)*H

Ans:ABC*DEF^/G*-H*+

13.The
maximum throughput Smax for Pure ALOHA is:

A..369

B..186

C..184*

D..364

Ans:C

14.An array
element is accessed using:

A.A first in first out approach

B.The dot operator

C.A member name

D.An index number*

Ans:D

15.What is
the minimum number of edges which must be removed from a complete bipartite
graph ofsix nodes
K(6),so that the remaining graph is planar?

A.3

B.4

C.5

D.6*

Ans:D

16.If x is
an array of integer,then the value of & x[i]is same as:

Ans:&x[i-1]+size of (int)

17.The best
normal form of the relation schema R(A,B,C,D) along with set of functional
dependencies

F={AB->C,AB->D,C->A.D->B)is:

A.First Normal Form

B.Second Normal Form*

C.Third Normal Form

D.Boyce Codd Normal Form

Ans:B

18.The GSM
network is divided into the following three
major systems:

Ans:SS,BSS,OSS

19.The worst
case time complexity of AVL tree is better in comparison to binary search tree
for

A.Search and Insert operations

B.Search and Delete operations

C.Insert and Delete operations

D.Search,Insert and Delete operations*

Ans:D

20.IF the
disk head is located initially at 32,find the number of disk moves required
with FCFS if the diskqueue
of I/O block requests are 98,37,14,124,65,67:

A.320

B.321*

C.322

D.325

Ans:B

21.The
following program

Main()

{

If(fork()>0)

Sleep(100);

}

A.A zombie process*

B.An orphan process

C.A process that executes forever

D.All of the above

Ans:A

22.Which of
the following logic families is well suited for high speed operations?

A.TTL

B.MOS

C.ECL*

D.CMOS

Ans:C

23.Procedural
code that is automatically executed in response to certain events on a
particular table orview
in a database:

A.Cursor

B.Stored procedure

C.Transaction

D.Trigger*

Ans:D

24.A
flip-flop circuit can be used for

A.Counting

B.Scaling

C.Both counting and scaling*

D.Demodulation

Ans:C

25. Consider
a disk pack with 16 surfaces,128 tracks per surface and 256 sectors per track.512 bytes ofdata are stored in a bit serial
manner in a sector.The capacity of disk
pack and the number of bitsrequired to specify a particular sector disk are respectively:

A.256 Mbytes,19 bits*

B.256 Mbytes,28 bits

C.512 Mbytes,20 bits

D.64 Gbytes,28 bits

Ans:A

26.Which of
the following instructions requires the most number of T-states?

A.MOV A,B

B.LDAX B

C.DAD D

D.MOV A,M*

Ans:D

27.Which
among the following is not used as a data structure while implementing bankers
Algorithm forDeadlock
avoidance?

A.Available

B.Max

C.Allocation

D.Required*

Ans:D

28.The
process of shuffling the memory contents so as to place all free memory
together in one largeblock
is called:A.Segmentation

B.Paging

C.Fragmentation

D.Compaction*

Ans:D

29.Bluetooth
technology is the implementation of a protocol defined by the standard:

A.IEEE 802.11

B.IEEE 802.14

C.IEEE 802.15*

D.IEEE 802.16

Ans:C

30.UDDI
stands for:

A.Universal Description,Discovery and Integration*

B.Universal Description,Detection and Integration

C.Universal Discovery,Description and Integration

D.Universal Detection,Description and Integration

Ans:A

31.Which of
the following statement is correct about the program given below:

#include<stdio.h>

Void main()

{

Int
arr[3][3]=(1,2,3,4);

Print(“%d”,*(*(*(arr))));

}

A.It will output a garbage value

B.It will output a value 1

C.It will output a value 3

D.It will report an error*

Ans:D

32.The
mechanism which allows multiple senders to transmit multiple groups of
receivers,permitsindividual
receivers to switch channels freely and optimizes bandwidth use while at the
same timeeliminating
congestion:

A.Resource Reservation Protocol*

B.Load Schedding

C.Admission Control

D.Jitter Control

Ans:A

33.The
wait()and notify() methods in Java comes under the class:

A.Java.lang.Thread

B.Java.lang.Object*

C.Java.lang.Runnable

D.None of these

Ans:B

34.Which
method is used for garbage collection in Java?

A.finally()

B.Final()

C.Finalize()*

D.None of these

Ans:C

35.Good
software attributes are:

A.High Cohesion Low Coupling*

B.Low Cohesion High Coupling

C.Low Cohesion Low Coupling

D.High Cohesion High Coupling

Ans:A

36.The
fourth level of Capability Maturity Model is:

A.Repeatable

B.Defined

C.Managed*

D.Optimizing

Ans:C

37.The
installation approach in which totally removing the old manual or computerized
system and putting the new system in use:

A.Parallel run

B.Phased approach

C.Pilot installation

D.None of these*

Ans:D

38.Spiral
model comes under the process model:

A.Prototype Model

B.Iterative Model*

C.Formal Model

D.Component Assembly Model

Ans:B

39..If P(A)
and P(B) are the probabilities of A and B,then Baye’s theorem can be stated as:

Ans:P(A\B)=(P(B\A)P(A))/P(B)

40.Which of
the following statements is FALSE?

Ans.(P^Q)v(~P^Q)v(P^~Q)is equal to ~Q^~P

41.Signal R
is a library which provides the facility of real time web functionality to:

A.Java Applications

B.PHP Applications

C.ASP.NET Applications*

D.None of these

Ans:C

42.JSP is a
technology for developing web pages that support dynamic content which helps
developers insert Java Code in HTML pages by making use of special JSP
tags,most of which:

Ans:Start with<% and end with %>

43.Which of
the following is the correct syntax in CSS?

Ans:list-style-image:url(‘sqpurple.gif’);

44.The
method(s)which returns the index of a
specified text in a string in Java script is:

A.Search()only

B.indexOf()only

C.Both search()and indexOf()*

D.Substring()

Ans:C

45.AJAX is
based on internet standards,and uses a combination of:

A.XML Http Request Object,Javascript,Jquery,XML

B.XML HttpRequest object,Javascript,CSS,XML*

C.XML HttpRequest object,JavaScript,Silverlight,XML

D.None of these

Ans:B

46.In PHP,an
array with named keys are called:

A.Indexed arrays

B.Multidimensional arrays

C.Associative arrays*

D.Numeric arrays

Ans:C

47.Which of
the following are used for client side scripting?

A.Java Script and VB Script*

B.Java Script,VB script and XML

C.Java script and XML

D.VB Script and XML

Ans:A

48.The Java
compiler translates source code into:

A.Machine code

B.Assembly code

C.Byte code*

D.JVM code

Ans:C

49.Which of
the following is not a valid type in Java?

A.Void

B.Static*

C.Byte

D.Boolean

Ans:B

50.Scanner class
comes under the package:

A.Java.lang

B.Java.Io

C.Java.Net

D.Java.Util*

Ans:D

51.Which one
of the following is not a method of Window Listener interface?

A.WindowShown()*

B.WindowClosed()

C.Windowlconfied()

D.WindowClosing()

Ans:A

52.The
Graphics class method used to draw a circle in an applet is:

A.DrawRect()*

B.WindowClosed()

C.DrawSpher()

D.DrawOval()

Ans:A

53.In E-R
model,dotted oval represents:

A.Stored attribute

B.Key attribute

C.Derived attribute*

D.Partial key attribute

Ans:C

54.What is
the output of the following program?

Public class
Test

{

Public
static void main(String arg[])

{

Public
static final int value=5;float total;

Total=value+value/2;

System.out.print(total);

}

}

A.5.0

B.7.0

C.7.5

D.None of these*

Ans:D

55.A partial
ordered relation is transitive,reflexive and:

A.Antisymmetic*

B.Bisymmetric

C.Asymmetric

D.Symmetric

Ans:A

56.[~q^(p->q)]->~p
is:

A.Satisfiable

B.Unsatisfiable

C.Tautology*

D.Invalid

Ans:C

57.Pigeonhole
principle states that if A->B and |A|>|B|then:

A.f is not onto

B.f may be one-one

C.f is neither
one-one nor onto

D.f is not one-one*

Ans:D

58.IDEA
stands for:

A.International Digital Encryption Algorithm

B.Integrated Digital Encryption Algorithm

C.Integrated Data Encryption Algorithm

D.International Data Encryption Algorithm*

Ans:D

59.A
protocol specification for exchanging structured information in the implementation
of webservices in
computer networks:

A.Kerberos

B.XML

C.SOAP*

D.HTTPS

Ans:C

60.A Euler
graph is one in which

A.Only two vertices are of odd degree and rests are even

B.Only two vertices are of even degree and rests are odd

C.All the vertices are of odd degree

D.All the vertices are of even degree*

Ans:D

61.In
an undirected graph the number of nodes
with odd degree must be:

A.Zero

B.Even*

C.Prime

D.Odd

Ans:B

62.A graph
in which all nodes are of equal degrees is known as:

A.Multigraph

B.Regular graph*

C.Complete lattice

D.Non regular graph

Ans:B

63.Which
among the following is not an aggregate function in SQL?

A.Average()*

B.First()

C.Sum()

D.Min()

Ans:A

64.Arrange
the tasks involved in requirements elicitation in an appropriate manner.

i.Consolidation

ii.Prioritization

iii.Requirements
Gathering

iv.Evaluation

A.iii,I,ii,iv

B.iii,iv,ii,i*

C.iii,ii,iv,i

D.ii,iii,iv,i

Ans:B

65.Which of
the following is an indirect measure of product?

A.Quality

B.Complexity

C.Reliability

D.All of the above*

Ans:D

66.The
modification of the software to match changes in the ever changing environment
,falls underwhich
category of Software maintenance?

A.Adaptive*

B.Corrective

C.Perfective

D.Preventive

Ans:A

67.Which of
the following describes ‘Is a Relationship’?

A.Aggregation

B.Inheritance*

C.Dependency

D.None of these

Ans:B

68.Which of
the following is a dynamic model that shows how the system interacts with its
environmentas it is
used?

Thanks for downloading our Android application from Google playstore and write your reviews.If you like this website don't forget to share your friends,please may help them.Join online exam paid services just Rs.100/- (One Hundred Rupees only you get practice all question papers available here).Thanks for subscribing Youtube channel.We thank you for your valuable time and feedback.Don't forget to inform wrong answers to below the comment box."May All Your Dreams and Wishes Come True,and May Prosperity Touch Your Feet.Wishing You a Happy New Year."